Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-21937 (GCVE-0-2023-21937)
Vulnerability from cvelistv5 – Published: 2023-04-18 19:54 – Updated: 2025-02-13 16:40- Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Oracle Corporation | Java SE JDK and JRE |
Affected:
Oracle Java SE:8u361
Affected: Oracle Java SE:8u361-perf Affected: Oracle Java SE:11.0.18 Affected: Oracle Java SE:17.0.6 Affected: Oracle Java SE:20 Affected: Oracle GraalVM Enterprise Edition:20.3.9 Affected: Oracle GraalVM Enterprise Edition:21.3.5 Affected: Oracle GraalVM Enterprise Edition:22.3.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-21937",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T13:34:57.672416Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-17T13:35:04.830Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:59:28.528Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.couchbase.com/alerts/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5430"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5478"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Java SE JDK and JRE",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "Oracle Java SE:8u361"
},
{
"status": "affected",
"version": "Oracle Java SE:8u361-perf"
},
{
"status": "affected",
"version": "Oracle Java SE:11.0.18"
},
{
"status": "affected",
"version": "Oracle Java SE:17.0.6"
},
{
"status": "affected",
"version": "Oracle Java SE:20"
},
{
"status": "affected",
"version": "Oracle GraalVM Enterprise Edition:20.3.9"
},
{
"status": "affected",
"version": "Oracle GraalVM Enterprise Edition:21.3.5"
},
{
"status": "affected",
"version": "Oracle GraalVM Enterprise Edition:22.3.1"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-21T19:07:51.844Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html"
},
{
"url": "https://www.couchbase.com/alerts/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5430"
},
{
"url": "https://www.debian.org/security/2023/dsa-5478"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2023-21937",
"datePublished": "2023-04-18T19:54:25.624Z",
"dateReserved": "2022-12-17T19:26:00.722Z",
"dateUpdated": "2025-02-13T16:40:27.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-21937",
"date": "2026-04-17",
"epss": "0.00087",
"percentile": "0.2501"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"FE7FF02E-5A54-47BD-8FAC-E1F1E23CBD0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"725D21E1-8FEF-492C-9CCF-75DDD286FA71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"CBC05434-18E2-43D2-901F-BA97A3A3AC3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB648C28-DCDF-4CEE-816C-2D7EF91D2689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4C6A6B-46BA-471A-959C-D1819B5D5196\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"751BA15B-1950-4ABD-AFEB-B4F90587FF61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F26CDEF2-A840-4957-A390-19E48AEEC70A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB18EEA4-9670-4EBC-8559-6766740980F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85FB47B-1A8B-4758-83A7-3AC5B74D73FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B973ADC-5F00-4CC5-985F-F4E1BB9FF1EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC10C81D-E148-4208-BA86-086B935A1254\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25FA7A4D-B0E2-423E-8146-E221AE2D6120\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCAA4004-9319-478C-9D55-0E8307F872F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B199052-5732-4726-B06B-A12C70DFB891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8\", \"matchCriteriaId\": \"111E81BB-7D96-44EB-ACFA-415C3F3EA62A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11\", \"versionEndIncluding\": \"11.0.18\", \"matchCriteriaId\": \"90F6CEC5-2FD9-4ADB-9D86-B741C0ABCD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17\", \"versionEndIncluding\": \"17.0.6\", \"matchCriteriaId\": \"83395182-E46E-47FF-A781-4EF235BC83B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"70892D06-6E75-4425-BBF0-4B684EC62A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\", \"matchCriteriaId\": \"67ED8559-C348-4932-B7CE-CB96976A30EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\", \"matchCriteriaId\": \"40AC3D91-263F-4345-9FAA-0E573EA64590\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C4B2F24-A730-4818-90C8-A2D90C081F03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\", \"matchCriteriaId\": \"464087F2-C285-4574-957E-CE0663F07DE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\", \"matchCriteriaId\": \"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\", \"matchCriteriaId\": \"083419F8-FDDF-4E36-88F8-857DB317C1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\", \"matchCriteriaId\": \"07812576-3C35-404C-A7D7-9BE9E3D76E00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C52B1C-5447-4282-9667-9EBE0720B423\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\", \"matchCriteriaId\": \"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\", \"matchCriteriaId\": \"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AE30779-48FB-451E-8CE1-F469F93B8772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\", \"matchCriteriaId\": \"60590FDE-7156-4314-A012-AA38BD2ADDC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\", \"matchCriteriaId\": \"F24F6122-2256-41B6-9033-794C6424ED99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1D6F19F-59B5-4BB6-AD35-013384025970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\", \"matchCriteriaId\": \"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\", \"matchCriteriaId\": \"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\", \"matchCriteriaId\": \"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CB74086-14B8-4237-8357-E0C6B5BB8313\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\", \"matchCriteriaId\": \"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A3F367-33AD-47C3-BFDC-871A17E72C94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\", \"matchCriteriaId\": \"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\", \"matchCriteriaId\": \"78261932-7373-4F16-91E0-1A72ADBEBC3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\", \"matchCriteriaId\": \"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5A40B8A-D428-4008-9F21-AF21394C51D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\", \"matchCriteriaId\": \"3102AA10-99A8-49A9-867E-7EEC56865680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*\", \"matchCriteriaId\": \"15BA8A26-2CDA-442B-A549-6BE92DCCD205\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*\", \"matchCriteriaId\": \"56F2883B-6A1B-4081-8877-07AF3A73F6CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*\", \"matchCriteriaId\": \"98C0742E-ACDD-4DB4-8A4C-B96702C8976C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8483034-DD5A-445D-892F-CDE90A7D58EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*\", \"matchCriteriaId\": \"1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*\", \"matchCriteriaId\": \"383F0B07-59BF-4744-87F2-04C98BC183B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*\", \"matchCriteriaId\": \"494C17C6-54A3-4BE6-A4FF-2D54DF2B38D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*\", \"matchCriteriaId\": \"1058ABDC-D652-4E2D-964D-C9C98FD404F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\", \"matchCriteriaId\": \"8279718F-878F-4868-8859-1728D13CD0D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F24389D-DDD0-4204-AA24-31C920A4F47E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\", \"matchCriteriaId\": \"966979BE-1F21-4729-B6B8-610F74648344\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8534265-33BF-460D-BF74-5F55FDE50F29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\", \"matchCriteriaId\": \"F77AFC25-1466-4E56-9D5F-6988F3288E16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\", \"matchCriteriaId\": \"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\", \"matchCriteriaId\": \"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\", \"matchCriteriaId\": \"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\", \"matchCriteriaId\": \"27BC4150-70EC-462B-8FC5-20B3442CBB31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\", \"matchCriteriaId\": \"02646989-ECD9-40AE-A83E-EFF4080C69B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77172BC0-8637-41F6-AE3B-83006D6735DE\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}]",
"id": "CVE-2023-21937",
"lastModified": "2024-11-21T07:43:57.107",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 3.7, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 1.4}]}",
"published": "2023-04-18T20:15:14.507",
"references": "[{\"url\": \"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0008/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"https://www.couchbase.com/alerts/\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5430\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5478\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2023.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0008/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.couchbase.com/alerts/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5430\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5478\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2023.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-21937\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2023-04-18T20:15:14.507\",\"lastModified\":\"2024-11-21T07:43:57.107\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"FE7FF02E-5A54-47BD-8FAC-E1F1E23CBD0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"725D21E1-8FEF-492C-9CCF-75DDD286FA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"CBC05434-18E2-43D2-901F-BA97A3A3AC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB648C28-DCDF-4CEE-816C-2D7EF91D2689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4C6A6B-46BA-471A-959C-D1819B5D5196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751BA15B-1950-4ABD-AFEB-B4F90587FF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26CDEF2-A840-4957-A390-19E48AEEC70A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18EEA4-9670-4EBC-8559-6766740980F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85FB47B-1A8B-4758-83A7-3AC5B74D73FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B973ADC-5F00-4CC5-985F-F4E1BB9FF1EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10C81D-E148-4208-BA86-086B935A1254\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25FA7A4D-B0E2-423E-8146-E221AE2D6120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAA4004-9319-478C-9D55-0E8307F872F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B199052-5732-4726-B06B-A12C70DFB891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8\",\"matchCriteriaId\":\"111E81BB-7D96-44EB-ACFA-415C3F3EA62A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11\",\"versionEndIncluding\":\"11.0.18\",\"matchCriteriaId\":\"90F6CEC5-2FD9-4ADB-9D86-B741C0ABCD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17\",\"versionEndIncluding\":\"17.0.6\",\"matchCriteriaId\":\"83395182-E46E-47FF-A781-4EF235BC83B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"70892D06-6E75-4425-BBF0-4B684EC62A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"67ED8559-C348-4932-B7CE-CB96976A30EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC3D91-263F-4345-9FAA-0E573EA64590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B2F24-A730-4818-90C8-A2D90C081F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"464087F2-C285-4574-957E-CE0663F07DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\",\"matchCriteriaId\":\"083419F8-FDDF-4E36-88F8-857DB317C1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\",\"matchCriteriaId\":\"07812576-3C35-404C-A7D7-9BE9E3D76E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C52B1C-5447-4282-9667-9EBE0720B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE30779-48FB-451E-8CE1-F469F93B8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\",\"matchCriteriaId\":\"60590FDE-7156-4314-A012-AA38BD2ADDC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24F6122-2256-41B6-9033-794C6424ED99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D6F19F-59B5-4BB6-AD35-013384025970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\",\"matchCriteriaId\":\"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB74086-14B8-4237-8357-E0C6B5BB8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\",\"matchCriteriaId\":\"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3F367-33AD-47C3-BFDC-871A17E72C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"78261932-7373-4F16-91E0-1A72ADBEBC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A40B8A-D428-4008-9F21-AF21394C51D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"3102AA10-99A8-49A9-867E-7EEC56865680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BA8A26-2CDA-442B-A549-6BE92DCCD205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F2883B-6A1B-4081-8877-07AF3A73F6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C0742E-ACDD-4DB4-8A4C-B96702C8976C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8483034-DD5A-445D-892F-CDE90A7D58EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*\",\"matchCriteriaId\":\"1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*\",\"matchCriteriaId\":\"383F0B07-59BF-4744-87F2-04C98BC183B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*\",\"matchCriteriaId\":\"494C17C6-54A3-4BE6-A4FF-2D54DF2B38D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*\",\"matchCriteriaId\":\"1058ABDC-D652-4E2D-964D-C9C98FD404F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"8279718F-878F-4868-8859-1728D13CD0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24389D-DDD0-4204-AA24-31C920A4F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"966979BE-1F21-4729-B6B8-610F74648344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8534265-33BF-460D-BF74-5F55FDE50F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F77AFC25-1466-4E56-9D5F-6988F3288E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\",\"matchCriteriaId\":\"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\",\"matchCriteriaId\":\"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BC4150-70EC-462B-8FC5-20B3442CBB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"02646989-ECD9-40AE-A83E-EFF4080C69B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77172BC0-8637-41F6-AE3B-83006D6735DE\"}]}]}],\"references\":[{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230427-0008/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://www.couchbase.com/alerts/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5430\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5478\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2023.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230427-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.couchbase.com/alerts/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuapr2023.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.couchbase.com/alerts/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0008/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5430\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5478\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:59:28.528Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-21937\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-17T13:34:57.672416Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-17T13:35:02.313Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"Java SE JDK and JRE\", \"versions\": [{\"status\": \"affected\", \"version\": \"Oracle Java SE:8u361\"}, {\"status\": \"affected\", \"version\": \"Oracle Java SE:8u361-perf\"}, {\"status\": \"affected\", \"version\": \"Oracle Java SE:11.0.18\"}, {\"status\": \"affected\", \"version\": \"Oracle Java SE:17.0.6\"}, {\"status\": \"affected\", \"version\": \"Oracle Java SE:20\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:20.3.9\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:21.3.5\"}, {\"status\": \"affected\", \"version\": \"Oracle GraalVM Enterprise Edition:22.3.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuapr2023.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://www.couchbase.com/alerts/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0008/\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5430\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5478\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\"}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-06-21T19:07:51.844Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-21937\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T16:40:27.188Z\", \"dateReserved\": \"2022-12-17T19:26:00.722Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2023-04-18T19:54:25.624Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0686
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | AIX | AIX version 7.2 sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec python versions 3.9.x antérieures à 3.9.17 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.15.1 | ||
| IBM | AIX | AIX version 7.3 sans le dernier correctif de sécurité | ||
| IBM | VIOS | VIOS 3.1 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AIX version 7.2 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec python versions 3.9.x ant\u00e9rieures \u00e0 3.9.17",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.15.1",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS 3.1 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2023-40371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40371"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0686",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028095 du 18 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028095"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028420 du 23 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028420"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028316 du 22 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028316"
}
]
}
CERTFR-2024-AVI-0692
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.10 | ||
| IBM | WebSphere | IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions antérieures à 8 Service Refresh 8 FP30 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.2.x à 7.5.x antérieures à 7.5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | QRadar SIEM | QRadar Suite versions 1.10.x antérieures à 1.10.24.0 | ||
| IBM | VIOS | VIOS version 4.1 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x antérieures à 8.5.5.11 ou sans le correctif de sécurité temporaire PH62458 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.2.x antérieures à 6.2.1.0 GA iFix13 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 GA iFix02 | ||
| IBM | Cognos Analytics | Cognos Dashboards on Cloud Pak for Data versions antérieures à 5.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions ant\u00e9rieures \u00e0 8 Service Refresh 8 FP30",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.2.x \u00e0 7.5.x ant\u00e9rieures \u00e0 7.5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x sans le dernier correctif de s\u00e9curit\u00e9 ",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite versions 1.10.x ant\u00e9rieures \u00e0 1.10.24.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.11 ou sans le correctif de s\u00e9curit\u00e9 temporaire PH62458",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.x ant\u00e9rieures \u00e0 6.2.1.0 GA iFix13",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 GA iFix02",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.0.0",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-23613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-25024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25024"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-37168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37168"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2024-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22233"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2024-30261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30261"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2024-30260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30260"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-28799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28799"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-23612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0692",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165247",
"url": "https://www.ibm.com/support/pages/node/7165247"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165360",
"url": "https://www.ibm.com/support/pages/node/7165360"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165340",
"url": "https://www.ibm.com/support/pages/node/7165340"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165344",
"url": "https://www.ibm.com/support/pages/node/7165344"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165423",
"url": "https://www.ibm.com/support/pages/node/7165423"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165284",
"url": "https://www.ibm.com/support/pages/node/7165284"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165362",
"url": "https://www.ibm.com/support/pages/node/7165362"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165364",
"url": "https://www.ibm.com/support/pages/node/7165364"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165363",
"url": "https://www.ibm.com/support/pages/node/7165363"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165488",
"url": "https://www.ibm.com/support/pages/node/7165488"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165685",
"url": "https://www.ibm.com/support/pages/node/7165685"
}
]
}
CERTFR-2024-AVI-0692
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.10 | ||
| IBM | WebSphere | IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions antérieures à 8 Service Refresh 8 FP30 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.2.x à 7.5.x antérieures à 7.5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | QRadar SIEM | QRadar Suite versions 1.10.x antérieures à 1.10.24.0 | ||
| IBM | VIOS | VIOS version 4.1 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x antérieures à 8.5.5.11 ou sans le correctif de sécurité temporaire PH62458 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.2.x antérieures à 6.2.1.0 GA iFix13 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 GA iFix02 | ||
| IBM | Cognos Analytics | Cognos Dashboards on Cloud Pak for Data versions antérieures à 5.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions ant\u00e9rieures \u00e0 8 Service Refresh 8 FP30",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.2.x \u00e0 7.5.x ant\u00e9rieures \u00e0 7.5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x sans le dernier correctif de s\u00e9curit\u00e9 ",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite versions 1.10.x ant\u00e9rieures \u00e0 1.10.24.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.11 ou sans le correctif de s\u00e9curit\u00e9 temporaire PH62458",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.x ant\u00e9rieures \u00e0 6.2.1.0 GA iFix13",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 GA iFix02",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.0.0",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-23613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-25024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25024"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-37168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37168"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2024-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22233"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2024-30261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30261"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2024-30260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30260"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-28799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28799"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-23612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0692",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165247",
"url": "https://www.ibm.com/support/pages/node/7165247"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165360",
"url": "https://www.ibm.com/support/pages/node/7165360"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165340",
"url": "https://www.ibm.com/support/pages/node/7165340"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165344",
"url": "https://www.ibm.com/support/pages/node/7165344"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165423",
"url": "https://www.ibm.com/support/pages/node/7165423"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165284",
"url": "https://www.ibm.com/support/pages/node/7165284"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165362",
"url": "https://www.ibm.com/support/pages/node/7165362"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165364",
"url": "https://www.ibm.com/support/pages/node/7165364"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165363",
"url": "https://www.ibm.com/support/pages/node/7165363"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165488",
"url": "https://www.ibm.com/support/pages/node/7165488"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165685",
"url": "https://www.ibm.com/support/pages/node/7165685"
}
]
}
CERTFR-2023-AVI-0839
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Order Management versions 10.0.x antérieures à 10.0.2309.0 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 antérieures à 4.7 Refresh 3 | ||
| IBM | Db2 | IBM Db2 versions 10.5.0.x sans les derniers correctifs de sécurité | ||
| IBM | Db2 | IBM Db2 versions 11.1.4.x sans les derniers correctifs de sécurité | ||
| IBM | Db2 | IBM Db2 REST versions 1.0.0.121-amd64 à 1.0.0.276-amd64 antérieures à 1.0.0.291-amd64 | ||
| IBM | N/A | IBM Db2 Warehouse on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 antérieures à 4.7 Refresh 3 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x sans les derniers correctifs de sécurité | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.5.x antérieures à 7.5.0 UP6 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Order Management versions 10.0.x ant\u00e9rieures \u00e0 10.0.2309.0",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 ant\u00e9rieures \u00e0 4.7 Refresh 3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 10.5.0.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.1.4.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 REST versions 1.0.0.121-amd64 \u00e0 1.0.0.276-amd64 ant\u00e9rieures \u00e0 1.0.0.291-amd64",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Warehouse on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 ant\u00e9rieures \u00e0 4.7 Refresh 3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2023-32697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32697"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-29007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29007"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-20867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20867"
},
{
"name": "CVE-2023-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28709"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-30441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30441"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-34396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34396"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2020-28491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28491"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2023-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34981"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2023-30994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30994"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-25652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25652"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-40367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40367"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2023-34149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34149"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0839",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047565 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047565"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049129 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049129"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047481 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047481"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049434 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049434"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047499 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047499"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047754 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047754"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049133 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049133"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047724 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047724"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049435 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049435"
}
]
}
CERTFR-2023-AVI-0513
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, un déni de service, une injection de code indirecte à distance (XSS), une élévation de privilèges, un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct File Agent versions 1.4.x antérieures à 1.4.0.2_iFix042 | ||
| IBM | Sterling Connect:Direct | BM Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.17 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.x antérieures à 6.2.0.4_iFix039 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.x antérieures à 7.5.0 UP6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.x antérieures à 6.1.0.2_iFix064 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.x antérieures à 6.0.0.4_iFix068 | ||
| IBM | N/A | IBM Connect:Direct Web Services versions 6.1.x antérieures à 6.1.0.19 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.3.x antérieures à 6.3.0.0_iFix007 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct File Agent versions 1.4.x ant\u00e9rieures \u00e0 1.4.0.2_iFix042",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "BM Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.17",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.4_iFix039",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM version 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP6",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2_iFix064",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.x ant\u00e9rieures \u00e0 6.0.0.4_iFix068",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Connect:Direct Web Services versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.19",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.0_iFix007",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-23521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23521"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"name": "CVE-2022-41903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41903"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2015-0254",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0254"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20863"
},
{
"name": "CVE-2019-18348",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18348"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-20859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20859"
},
{
"name": "CVE-2022-34917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34917"
},
{
"name": "CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0513",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9, un d\u00e9ni de service, une\ninjection de code indirecte \u00e0 distance (XSS), une \u00e9l\u00e9vation de\nprivil\u00e8ges, un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010099 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010099"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7009987 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7009987"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7009301 du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7009301"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010095 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010095"
}
]
}
CERTFR-2024-AVI-0010
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM OS Image pour AIX Systems versions antérieures à AIX 7.2 TL5 SP6 sur Cloud Pak System versions antérieures à V2.3.3.7 Interim Fix 01 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | N/A | Db2 Warehouse on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | Db2 | IBM Db2 Web Query for i versions antérieures à 2.4.0 sans les derniers correctifs de sécurité |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM OS Image pour AIX Systems versions ant\u00e9rieures \u00e0 AIX 7.2 TL5 SP6 sur Cloud Pak System versions ant\u00e9rieures \u00e0 V2.3.3.7 Interim Fix 01",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query for i versions ant\u00e9rieures \u00e0 2.4.0 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-20862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20862"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2022-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41946"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43646"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20863"
},
{
"name": "CVE-2017-15708",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15708"
},
{
"name": "CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105215 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105138 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105138"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7104447 du 02 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7104447"
}
]
}
CERTFR-2025-AVI-0003
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 warehouse versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24795"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2022-31163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31163"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2021-41186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41186"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-0759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0759"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2021-32740",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32740"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0003",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180133",
"url": "https://www.ibm.com/support/pages/node/7180133"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180137",
"url": "https://www.ibm.com/support/pages/node/7180137"
},
{
"published_at": "2025-01-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180105",
"url": "https://www.ibm.com/support/pages/node/7180105"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180134",
"url": "https://www.ibm.com/support/pages/node/7180134"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180135",
"url": "https://www.ibm.com/support/pages/node/7180135"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180138",
"url": "https://www.ibm.com/support/pages/node/7180138"
}
]
}
CERTFR-2023-AVI-0325
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20 | ||
| Oracle | Database Server | Oracle Database Server 19c, 21c | ||
| Oracle | N/A | Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1 | ||
| Oracle | PeopleSoft | Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2 | ||
| Oracle | Virtualization | Oracle Virtualization versions 6.1.x antérieures à 6.1.44 | ||
| Oracle | MySQL | Oracle MySQL versions 8.0.33 et antérieures | ||
| Oracle | Systems | Oracle Systems versions 10, 11 | ||
| Oracle | Virtualization | Oracle Virtualization versions 7.0.x antérieures à 7.0.8 | ||
| Oracle | MySQL | Oracle MySQL versions 5.7.41 et antérieures | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database Server 19c, 21c",
"product": {
"name": "Database Server",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Virtualization versions 6.1.x ant\u00e9rieures \u00e0 6.1.44",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 8.0.33 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Systems versions 10, 11",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Virtualization versions 7.0.x ant\u00e9rieures \u00e0 7.0.8",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 5.7.41 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21916"
},
{
"name": "CVE-2023-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21985"
},
{
"name": "CVE-2023-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21979"
},
{
"name": "CVE-2023-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21986"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21940"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21962"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21917"
},
{
"name": "CVE-2023-21984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21984"
},
{
"name": "CVE-2023-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21956"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21945"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2023-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21966"
},
{
"name": "CVE-2023-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21947"
},
{
"name": "CVE-2023-22002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22002"
},
{
"name": "CVE-2023-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21981"
},
{
"name": "CVE-2023-21987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21987"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21971",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21971"
},
{
"name": "CVE-2023-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21999"
},
{
"name": "CVE-2023-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21928"
},
{
"name": "CVE-2023-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21972"
},
{
"name": "CVE-2023-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21960"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2023-21990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21990"
},
{
"name": "CVE-2023-22000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22000"
},
{
"name": "CVE-2023-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21913"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
},
{
"name": "CVE-2020-6950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6950"
},
{
"name": "CVE-2023-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21996"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2023-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21953"
},
{
"name": "CVE-2023-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21934"
},
{
"name": "CVE-2023-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22003"
},
{
"name": "CVE-2023-21998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21998"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21946"
},
{
"name": "CVE-2023-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21933"
},
{
"name": "CVE-2023-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21931"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-45143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45143"
},
{
"name": "CVE-2023-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21896"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2023-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21964"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21920"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21918"
},
{
"name": "CVE-2023-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21992"
},
{
"name": "CVE-2023-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21911"
},
{
"name": "CVE-2023-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21976"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21991"
},
{
"name": "CVE-2023-21989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21989"
},
{
"name": "CVE-2023-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21982"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21935"
},
{
"name": "CVE-2020-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25638"
},
{
"name": "CVE-2023-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21955"
},
{
"name": "CVE-2023-21988",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21988"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2022-45047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
},
{
"name": "CVE-2022-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36033"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21929"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22001"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2023-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21948"
},
{
"name": "CVE-2023-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21919"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0325",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-19T00:00:00.000000"
},
{
"description": "Correction coquilles.",
"revision_date": "2023-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2023 du 18 avril 2023",
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
| Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
| Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
| Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2024-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21602"
},
{
"name": "CVE-2022-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
},
{
"name": "CVE-2023-38802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38802"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-41973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41973"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2024-21616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21616"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2024-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21599"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2024-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21614"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2024-21607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21607"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2024-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21596"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2024-21604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21604"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21600"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21606"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21591"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21587"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-4254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4254"
},
{
"name": "CVE-2024-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21617"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2024-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21589"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21595"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22164"
},
{
"name": "CVE-2024-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21597"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2024-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21613"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-21612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21612"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2024-21603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21603"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21585"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2023-36842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36842"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2024-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21594"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2024-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21601"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"
}
]
}
CERTFR-2023-AVI-0541
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix088 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.3.0.x antérieures à 6.3.0.0.iFix011 | ||
| IBM | Db2 | IBM Db2 versions 10.5.x.x antérieures à 10.5 FP11 sans le dernier correctif temporaire | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct FTP+ versions 1.3.x antérieures à 1.3.0.iFix024 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x antérieures à 11.5.7 sans le dernier correctif temporaire | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.2.0.x antérieures à 6.2.0.6.iFix024 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x antérieures à 11.5.8 sans le dernier correctif temporaire | ||
| IBM | Db2 | IBM Db2 versions 11.1.4.x antérieures à 11.1.4 FP7 sans le dernier correctif temporaire | ||
| IBM | Sterling | IBM Sterling Connect:Express pour UNIX version 1.5 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.0.0x. antérieures à 6.0.0.2.iFix152 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.4.iFix088",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.0.iFix011",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 10.5.x.x ant\u00e9rieures \u00e0 10.5 FP11 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct FTP+ versions 1.3.x ant\u00e9rieures \u00e0 1.3.0.iFix024",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.7 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6.iFix024",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.8 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.1.4.x ant\u00e9rieures \u00e0 11.1.4 FP7 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Express pour UNIX version 1.5",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.0.0x. ant\u00e9rieures \u00e0 6.0.0.2.iFix152",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2023-32331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32331"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010565"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010571"
}
],
"reference": "CERTFR-2023-AVI-0541",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011443 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011443"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011409 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011409"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011405 du 12 juillet 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010557 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010557"
}
]
}
CERTFR-2024-AVI-1051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | VIOS | VIOS version 3.1 sans le correctif invscout_fix7.tar | ||
| IBM | AIX | AIX version 7.3 sans le correctif invscout_fix7.tar | ||
| IBM | Cognos Controller | Cognos Controller versions 11.0.x antérieures à 11.0.1 FP3 | ||
| IBM | AIX | AIX version 7.2 sans le correctif invscout_fix7.tar | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.x antérieures à 6.2.2.2 | ||
| IBM | QRadar Use Case Manager App | QRadar Use Case Manager App versions antérieures à 4.0.0 | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.1.x antérieures à 6.1.2.10 | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.1.x antérieures à 6.1.2.10 | ||
| IBM | VIOS | VIOS version 4.1 sans le correctif invscout_fix7.tar | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.x antérieures à 6.2.3.2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VIOS version 3.1 sans le correctif invscout_fix7.tar",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 sans le correctif invscout_fix7.tar",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Controller versions 11.0.x ant\u00e9rieures \u00e0 11.0.1 FP3",
"product": {
"name": "Cognos Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 sans le correctif invscout_fix7.tar",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.x ant\u00e9rieures \u00e0 6.2.2.2",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "QRadar Use Case Manager App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.1.x ant\u00e9rieures \u00e0 6.1.2.10",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.1.x ant\u00e9rieures \u00e0 6.1.2.10",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 sans le correctif invscout_fix7.tar",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.x ant\u00e9rieures \u00e0 6.2.3.2",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-47115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47115"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-32213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32213"
},
{
"name": "CVE-2021-22959",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22959"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25020"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2022-35256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35256"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-41777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41777"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2024-25035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25035"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-38737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38737"
},
{
"name": "CVE-2023-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2022-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0155"
},
{
"name": "CVE-2021-22960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22960"
},
{
"name": "CVE-2024-41776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41776"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-25019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25019"
},
{
"name": "CVE-2022-32222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32222"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-32212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2022-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0536"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-29892",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29892"
},
{
"name": "CVE-2024-45676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45676"
},
{
"name": "CVE-2023-49735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49735"
},
{
"name": "CVE-2024-40691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40691"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2022-32215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32215"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2024-41775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41775"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2021-44533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44533"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-32214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32214"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2022-21824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21824"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35255"
},
{
"name": "CVE-2024-25036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25036"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-32223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32223"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178033",
"url": "https://www.ibm.com/support/pages/node/7178033"
},
{
"published_at": "2024-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178054",
"url": "https://www.ibm.com/support/pages/node/7178054"
},
{
"published_at": "2024-12-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177220",
"url": "https://www.ibm.com/support/pages/node/7177220"
},
{
"published_at": "2024-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177981",
"url": "https://www.ibm.com/support/pages/node/7177981"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
| Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
| Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
| Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3707"
},
{
"name": "CVE-2024-21602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21602"
},
{
"name": "CVE-2022-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41974"
},
{
"name": "CVE-2023-38802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38802"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-41973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41973"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2024-21616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21616"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2023-2235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2235"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-1281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1281"
},
{
"name": "CVE-2024-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21599"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2024-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21614"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2022-4269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4269"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2024-21607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21607"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-0266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0266"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-3239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3239"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2021-4104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4104"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2024-21596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21596"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2024-21604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21604"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2020-9493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9493"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-21600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21600"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21606"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21591"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-43945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43945"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2024-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21587"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-4254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4254"
},
{
"name": "CVE-2024-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21617"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2024-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21589"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21595"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-22164",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22164"
},
{
"name": "CVE-2024-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21597"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0386"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2024-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21613"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-21612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21612"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2024-21603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21603"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21585"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2023-36842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36842"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2024-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21594"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2024-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21601"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0027",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"
}
]
}
CERTFR-2024-AVI-0010
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM OS Image pour AIX Systems versions antérieures à AIX 7.2 TL5 SP6 sur Cloud Pak System versions antérieures à V2.3.3.7 Interim Fix 01 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | N/A | Db2 Warehouse on Cloud Pak for Data versions antérieures à v4.8 | ||
| IBM | Db2 | IBM Db2 Web Query for i versions antérieures à 2.4.0 sans les derniers correctifs de sécurité |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM OS Image pour AIX Systems versions ant\u00e9rieures \u00e0 AIX 7.2 TL5 SP6 sur Cloud Pak System versions ant\u00e9rieures \u00e0 V2.3.3.7 Interim Fix 01",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query for i versions ant\u00e9rieures \u00e0 2.4.0 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-20862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20862"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2022-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41946"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43646"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20863"
},
{
"name": "CVE-2017-15708",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15708"
},
{
"name": "CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105215 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7105138 du 03 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7105138"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7104447 du 02 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7104447"
}
]
}
CERTFR-2024-AVI-0228
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect - Direct pour Microsoft Windows versions 6.3.0.x antérieures à 6.3.0.2_iFix012 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.0 sans le correctif de sécurité iFix 03 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.3 sans le correctif de sécurité iFix 11 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.2.2.x antérieures à 6.2.2.2 sans le dernier correctif de sécurité | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF06 | ||
| IBM | Sterling | Sterling Connect - Direct pour Microsoft Windows versions 6.2.0.x antérieures à 6.2.0.6_iFix012 | ||
| IBM | Db2 | IBM Db2 Web Query pour i version 2.4.0 sans les correctifs de sécurité SI85982 et SI85987 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.2.0.x antérieures à 6.2.0.7 sans le dernier correctif de sécurité | ||
| IBM | Sterling | Sterling Connect - Direct File Agent versions 1.4.0.x antérieures à 1.4.0.3_iFix004 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.1.2.x antérieures à 6.1.2.9 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect - Direct pour Microsoft Windows versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.2_iFix012",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 03",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 11",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.2.2.x ant\u00e9rieures \u00e0 6.2.2.2 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF06",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect - Direct pour Microsoft Windows versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6_iFix012",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query pour i version 2.4.0 sans les correctifs de s\u00e9curit\u00e9 SI85982 et SI85987",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.7 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect - Direct File Agent versions 1.4.0.x ant\u00e9rieures \u00e0 1.4.0.3_iFix004",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.9 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47699"
},
{
"name": "CVE-2023-46179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46179"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-46182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46182"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2022-46337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-47147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47147"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2022-41678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41678"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2023-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34034"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39685"
},
{
"name": "CVE-2023-47162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47162"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-45177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45177"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-24839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24839"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-46181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46181"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0228",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142007 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142038 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142038"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138527 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138527"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138509 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138509"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7140420 du 13 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7140420"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138477 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138477"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142032 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142032"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138522 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138522"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7137248 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7137248"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7137258 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7137258"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138503 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138503"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142006 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142006"
}
]
}
CERTFR-2024-AVI-0057
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.0.0.x antérieures à 6.0.0.4_iFix083 | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de sécurité PH58718 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.2.0.x antérieures à 6.2.0.6_iFix006 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.3.0.x antérieures à 6.3.0.2_iFix005 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5. à 7.5.0 UP7 sans le correctif de sécurité 7.5.0 UP7 IF04 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.1.0.x antérieures à 6.1.0.2_iFix079 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.4_iFix083",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de s\u00e9curit\u00e9 PH58718",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6_iFix006",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.2_iFix005",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5. \u00e0 7.5.0 UP7 sans le correctif de s\u00e9curit\u00e9 7.5.0 UP7 IF04",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2_iFix079",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-34059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
},
{
"name": "CVE-2023-34058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50164"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50950"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7108657 du 17 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7108657"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7108659 du 17 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7108659"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7107841 du 16 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7107841"
}
]
}
CERTFR-2023-AVI-0839
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Order Management versions 10.0.x antérieures à 10.0.2309.0 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 antérieures à 4.7 Refresh 3 | ||
| IBM | Db2 | IBM Db2 versions 10.5.0.x sans les derniers correctifs de sécurité | ||
| IBM | Db2 | IBM Db2 versions 11.1.4.x sans les derniers correctifs de sécurité | ||
| IBM | Db2 | IBM Db2 REST versions 1.0.0.121-amd64 à 1.0.0.276-amd64 antérieures à 1.0.0.291-amd64 | ||
| IBM | N/A | IBM Db2 Warehouse on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 antérieures à 4.7 Refresh 3 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x sans les derniers correctifs de sécurité | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.5.x antérieures à 7.5.0 UP6 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Order Management versions 10.0.x ant\u00e9rieures \u00e0 10.0.2309.0",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 ant\u00e9rieures \u00e0 4.7 Refresh 3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 10.5.0.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.1.4.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 REST versions 1.0.0.121-amd64 \u00e0 1.0.0.276-amd64 ant\u00e9rieures \u00e0 1.0.0.291-amd64",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Warehouse on Cloud Pak for Data versions 3.5, 4.0, 4.5, 4.6, 4.7 ant\u00e9rieures \u00e0 4.7 Refresh 3",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2023-32697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32697"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-29007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29007"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-20867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20867"
},
{
"name": "CVE-2023-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28709"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-30441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30441"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-34396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34396"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2020-28491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28491"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2023-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34981"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2023-30994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30994"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-25652",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25652"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-40367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40367"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2023-34149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34149"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0839",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047565 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047565"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049129 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049129"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047481 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047481"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049434 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049434"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047499 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047499"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047754 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047754"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049133 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049133"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7047724 du 06 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7047724"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7049435 du 10 octobre 2023",
"url": "https://www.ibm.com/support/pages/node/7049435"
}
]
}
CERTFR-2026-AVI-0131
Vulnerability from certfr_avis - Published: 2026-02-06 - Updated: 2026-02-06
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x et postérieures, antérieures à 2.3.6.1 | ||
| IBM | Cognos Analytics | Cognos Command Center versions 10.2.4.x et 10.2.5.x antérieures à 10.2.5 FP1 IF2 | ||
| IBM | Db2 | DB2 sans le correctif de sécurité 11.5.9 Special Build 62071 | ||
| IBM | Db2 | DB2 Data Management Console antérieures à 3.1.13.1 | ||
| IBM | Db2 | DB2 Data Management Console on CPD versions antérieurs à 4.8 | ||
| IBM | Db2 | DB2 Recovery Expert for LUW version 5.5 IF2 sans le correctif de sécurité v5.5.0.1 Interim Fix 8 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x et post\u00e9rieures, ant\u00e9rieures \u00e0 2.3.6.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions 10.2.4.x et 10.2.5.x ant\u00e9rieures \u00e0 10.2.5 FP1 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 sans le correctif de s\u00e9curit\u00e9 11.5.9 Special Build 62071",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console on CPD versions ant\u00e9rieurs \u00e0 4.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Recovery Expert for LUW version 5.5 IF2 sans le correctif de s\u00e9curit\u00e9 v5.5.0.1 Interim Fix 8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27903"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2015-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3627"
},
{
"name": "CVE-2025-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27904"
},
{
"name": "CVE-2025-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27533"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-27900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27900"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-27899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27899"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-27901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27901"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-27898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27898"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2026-02-06T00:00:00",
"last_revision_date": "2026-02-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0131",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259447",
"url": "https://www.ibm.com/support/pages/node/7259447"
},
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7253572",
"url": "https://www.ibm.com/support/pages/node/7253572"
},
{
"published_at": "2026-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257780",
"url": "https://www.ibm.com/support/pages/node/7257780"
},
{
"published_at": "2026-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259901",
"url": "https://www.ibm.com/support/pages/node/7259901"
},
{
"published_at": "2026-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259526",
"url": "https://www.ibm.com/support/pages/node/7259526"
}
]
}
CERTFR-2023-AVI-0446
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | IBM WebSphere Service Registry and Repository versions 8.5.x antérieures sans le dernier correctif de sécurité V8.5.6.3_IJ47124 | ||
| IBM | WebSphere | IBM WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de sécurité V8.5.6.3_IJ47124 | ||
| IBM | QRadar WinCollect Agent | QRadar WinCollect Agent versions 10.0.x à 10.1.x antérieures à 10.1.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM WebSphere Service Registry and Repository versions 8.5.x ant\u00e9rieures sans le dernier correctif de s\u00e9curit\u00e9 V8.5.6.3_IJ47124",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de s\u00e9curit\u00e9 V8.5.6.3_IJ47124",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions 10.0.x \u00e0 10.1.x ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7002387 du 08 juin 2023",
"url": "https://www.ibm.com/support/pages/node/7002387"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7002501 du 08 juin 2023",
"url": "https://www.ibm.com/support/pages/node/7002501"
}
]
}
CERTFR-2025-AVI-0967
Vulnerability from certfr_avis - Published: 2025-11-05 - Updated: 2025-11-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | File Integrity Monitoring pour VMware Tanzu Platform versions antérieures à 2.1.49 | ||
| VMware | Tanzu Platform | Cloud Service Broker pour Azure pour VMware Tanzu Platform versions antérieures à 1.13.1 | ||
| VMware | Tanzu Platform | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Platform | Scheduler pour VMware Tanzu Platform versions antérieures à 2.0.21 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Platform | .NET Core Buildpack versions antérieures à 2.4.64 | ||
| VMware | Tanzu Platform | VMware Tanzu Data Flow sur Tanzu Platform versions antérieures à 2.0.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.4 | ||
| VMware | Tanzu Platform | CredHub Secrets Management pour VMware Tanzu Platform versions antérieures à 1.6.7 | ||
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.8 | ||
| VMware | Tanzu Platform | Go Buildpack versions antérieures à 1.10.57 | ||
| VMware | Tanzu Platform | VMware Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Platform | NodeJS Buildpack versions antérieures à 1.8.61 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.0 | ||
| VMware | Tanzu Platform | Application Services pour VMware Tanzu Platform versions antérieures à 3.3.11 | ||
| VMware | Tanzu Platform | IPsec Encryption pour VMware Tanzu Platform versions antérieures à 1.9.68 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "File Integrity Monitoring pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.49",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Service Broker pour Azure pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.13.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.21",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.64",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Data Flow sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.8",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.57",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.61",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "IPsec Encryption pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.9.68",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-7409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7409"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2024-6505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6505"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-43484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43484"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-54798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54798"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3447"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38229"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-43483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43483"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-58446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58446"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3446"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-43485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43485"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2025-6242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6242"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-61620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61620"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36323",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36323"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36343",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36343"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36326"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36305",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36305"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36345",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36345"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36329"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36316"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36331"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36334",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36334"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36335",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36335"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36340",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36340"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36319",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36319"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36339",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36339"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36322",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36322"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36321",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36321"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36324"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36336",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36336"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36318",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36318"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36337",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36337"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36346",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36346"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36315"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36317",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36317"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36344",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36344"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36341",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36341"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36314",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36314"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36330"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36332",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36332"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36304",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36304"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36342",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36342"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36333",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36333"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36327"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36338",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36338"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36328"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36325"
}
]
}
CERTFR-2024-AVI-1051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | VIOS | VIOS version 3.1 sans le correctif invscout_fix7.tar | ||
| IBM | AIX | AIX version 7.3 sans le correctif invscout_fix7.tar | ||
| IBM | Cognos Controller | Cognos Controller versions 11.0.x antérieures à 11.0.1 FP3 | ||
| IBM | AIX | AIX version 7.2 sans le correctif invscout_fix7.tar | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.2.x antérieures à 6.2.2.2 | ||
| IBM | QRadar Use Case Manager App | QRadar Use Case Manager App versions antérieures à 4.0.0 | ||
| IBM | Sterling Partner Engagement Manager Essentials Edition | Sterling Partner Engagement Manager Essentials Edition versions 6.1.x antérieures à 6.1.2.10 | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.1.x antérieures à 6.1.2.10 | ||
| IBM | VIOS | VIOS version 4.1 sans le correctif invscout_fix7.tar | ||
| IBM | Sterling Partner Engagement Manager Standard Edition | Sterling Partner Engagement Manager Standard Edition versions 6.2.x antérieures à 6.2.3.2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VIOS version 3.1 sans le correctif invscout_fix7.tar",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 sans le correctif invscout_fix7.tar",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Controller versions 11.0.x ant\u00e9rieures \u00e0 11.0.1 FP3",
"product": {
"name": "Cognos Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 sans le correctif invscout_fix7.tar",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.2.x ant\u00e9rieures \u00e0 6.2.2.2",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "QRadar Use Case Manager App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Essentials Edition versions 6.1.x ant\u00e9rieures \u00e0 6.1.2.10",
"product": {
"name": "Sterling Partner Engagement Manager Essentials Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.1.x ant\u00e9rieures \u00e0 6.1.2.10",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 sans le correctif invscout_fix7.tar",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager Standard Edition versions 6.2.x ant\u00e9rieures \u00e0 6.2.3.2",
"product": {
"name": "Sterling Partner Engagement Manager Standard Edition",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-47115",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47115"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2022-32213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32213"
},
{
"name": "CVE-2021-22959",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22959"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25020"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2022-35256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35256"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-41777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41777"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2024-25035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25035"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-38737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38737"
},
{
"name": "CVE-2023-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2022-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0155"
},
{
"name": "CVE-2021-22960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22960"
},
{
"name": "CVE-2024-41776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41776"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-25019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25019"
},
{
"name": "CVE-2022-32222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32222"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-32212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2022-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0536"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-29892",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29892"
},
{
"name": "CVE-2024-45676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45676"
},
{
"name": "CVE-2023-49735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49735"
},
{
"name": "CVE-2024-40691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40691"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2022-32215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32215"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2024-41775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41775"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2021-44533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44533"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-32214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32214"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2022-21824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21824"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35255"
},
{
"name": "CVE-2024-25036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25036"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-32223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32223"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178033",
"url": "https://www.ibm.com/support/pages/node/7178033"
},
{
"published_at": "2024-12-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178054",
"url": "https://www.ibm.com/support/pages/node/7178054"
},
{
"published_at": "2024-12-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177220",
"url": "https://www.ibm.com/support/pages/node/7177220"
},
{
"published_at": "2024-12-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177981",
"url": "https://www.ibm.com/support/pages/node/7177981"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2023-AVI-0574
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.0 sans le correctif de sécurité 7.5.0-QRADAR-PROTOCOL-MQJMS-7.5-20230327175444 | ||
| IBM | Sterling Control Center | IBM Sterling Control Center versions 6.1.3.x antérieures à 6.1.3.0 iFix18 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 7 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 2 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.1 à 1.5.0.2.x antérieures à 1.5.0.2.iFix36 | ||
| IBM | Db2 | IBM Db2 Web Query for i versions 2.3.0 et 2.4.0 sans le correctif de sécurité | ||
| IBM | N/A | AIX versions 7.2. et 7.3 et VIOS version 3.1 avec un fichier bind.rte versions 7.1.916.0 à 7.1.916.2601 sans le dernier correctif de sécurité | ||
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.4.0 sans le correctif de sécurité 7.4.0-QRADAR-PROTOCOL-MQJMS-7.4-20230327175451 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM version 7.5.0 sans le correctif de s\u00e9curit\u00e9 7.5.0-QRADAR-PROTOCOL-MQJMS-7.5-20230327175444",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions 6.1.3.x ant\u00e9rieures \u00e0 6.1.3.0 iFix18",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 7",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.1 \u00e0 1.5.0.2.x ant\u00e9rieures \u00e0 1.5.0.2.iFix36",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query for i versions 2.3.0 et 2.4.0 sans le correctif de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2. et 7.3 et VIOS version 3.1 avec un fichier bind.rte versions 7.1.916.0 \u00e0 7.1.916.2601 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM version 7.4.0 sans le correctif de s\u00e9curit\u00e9 7.4.0-QRADAR-PROTOCOL-MQJMS-7.4-20230327175451",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-25929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25929"
},
{
"name": "CVE-2019-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4378"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2021-39034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39034"
},
{
"name": "CVE-2020-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4320"
},
{
"name": "CVE-2019-4049",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4049"
},
{
"name": "CVE-2021-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38949"
},
{
"name": "CVE-2019-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4055"
},
{
"name": "CVE-2022-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3736"
},
{
"name": "CVE-2020-4682",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4682"
},
{
"name": "CVE-2023-28530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28530"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2019-4614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4614"
},
{
"name": "CVE-2019-4762",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4762"
},
{
"name": "CVE-2019-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4655"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2020-4338",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4338"
},
{
"name": "CVE-2019-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4656"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3924"
},
{
"name": "CVE-2019-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4227"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2019-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4619"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2019-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4261"
},
{
"name": "CVE-2019-4719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4719"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4310"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0574",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7013143 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7013143"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011771 du 13 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011771"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7013297 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7013297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012711 du 18 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012711"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012621 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012621"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012395 du 17 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012395"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2023-AVI-0513
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, un déni de service, une injection de code indirecte à distance (XSS), une élévation de privilèges, un problème de sécurité non spécifié par l'éditeur, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct File Agent versions 1.4.x antérieures à 1.4.0.2_iFix042 | ||
| IBM | Sterling Connect:Direct | BM Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.17 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.x antérieures à 6.2.0.4_iFix039 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.x antérieures à 7.5.0 UP6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.x antérieures à 6.1.0.2_iFix064 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.x antérieures à 6.0.0.4_iFix068 | ||
| IBM | N/A | IBM Connect:Direct Web Services versions 6.1.x antérieures à 6.1.0.19 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Microsoft Windows versions 6.3.x antérieures à 6.3.0.0_iFix007 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct File Agent versions 1.4.x ant\u00e9rieures \u00e0 1.4.0.2_iFix042",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "BM Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.17",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.4_iFix039",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM version 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP6",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2_iFix064",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.0.x ant\u00e9rieures \u00e0 6.0.0.4_iFix068",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Connect:Direct Web Services versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.19",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Microsoft Windows versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.0_iFix007",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-23521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23521"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"name": "CVE-2022-41903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41903"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2015-0254",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0254"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2022-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38023"
},
{
"name": "CVE-2023-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20863"
},
{
"name": "CVE-2019-18348",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18348"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-20859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20859"
},
{
"name": "CVE-2022-34917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34917"
},
{
"name": "CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0513",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9, un d\u00e9ni de service, une\ninjection de code indirecte \u00e0 distance (XSS), une \u00e9l\u00e9vation de\nprivil\u00e8ges, un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010099 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010099"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7009987 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7009987"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7009301 du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7009301"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010095 du 06 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010095"
}
]
}
CERTFR-2026-AVI-0249
Vulnerability from certfr_avis - Published: 2026-03-06 - Updated: 2026-03-06
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | QRadar Data Synchronization App versions antérieures à 3.3.0 | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 3.1.13 | ||
| IBM | Tivoli | Tivoli Netcool/OMNIbus_GUI sans le dernier correctif de sécurité | ||
| IBM | Db2 | DB2 Recovery Expert versions antérieures à 5.5.0.1 Interim Fix 8 | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à 5.3.1 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à 5.3.1 | ||
| IBM | QRadar | QRadar Pre-Validation App versions antérieures à 2.0.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Data Synchronization App versions ant\u00e9rieures \u00e0 3.3.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 3.1.13",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli Netcool/OMNIbus_GUI sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Recovery Expert versions ant\u00e9rieures \u00e0 5.5.0.1 Interim Fix 8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Pre-Validation App versions ant\u00e9rieures \u00e0 2.0.2",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2016-0703",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0703"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2025-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13867"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2025-47944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47944"
},
{
"name": "CVE-2024-3154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3154"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-36384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36384"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2016-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0800"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-49128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49128"
},
{
"name": "CVE-2025-22091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22091"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2025-36247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36247"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2022-46337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2019-19921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19921"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27903"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2016-4472",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4472"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2024-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9042"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-57822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57822"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-67779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67779"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55183"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22043"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2024-36621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36621"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-55173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55173"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-48910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48910"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2018-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5764"
},
{
"name": "CVE-2024-50264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
},
{
"name": "CVE-2025-57752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57752"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2020-15115",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15115"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-5187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5187"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2012-2098",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2098"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-35887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35887"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2026-25765",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25765"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2023-2727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2727"
},
{
"name": "CVE-2024-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-36425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36425"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2025-58457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58457"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-47935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47935"
},
{
"name": "CVE-2025-22085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22085"
},
{
"name": "CVE-2025-50537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50537"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2024-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21626"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2016-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0704"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2025-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1767"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2023-42503",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42503"
},
{
"name": "CVE-2025-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27904"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-14689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14689"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2024-47072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2025-27900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27900"
},
{
"name": "CVE-2025-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0426"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-27899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27899"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2023-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22044"
},
{
"name": "CVE-2025-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48997"
},
{
"name": "CVE-2025-27901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27901"
},
{
"name": "CVE-2022-45047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-27898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27898"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2023-2728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2728"
},
{
"name": "CVE-2024-7143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7143"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2025-7338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7338"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-55184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55184"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2025-59343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59343"
},
{
"name": "CVE-2024-36623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36623"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-36620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36620"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-03-06T00:00:00",
"last_revision_date": "2026-03-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0249",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262753",
"url": "https://www.ibm.com/support/pages/node/7262753"
},
{
"published_at": "2026-03-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262754",
"url": "https://www.ibm.com/support/pages/node/7262754"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262324",
"url": "https://www.ibm.com/support/pages/node/7262324"
},
{
"published_at": "2026-03-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262669",
"url": "https://www.ibm.com/support/pages/node/7262669"
},
{
"published_at": "2026-03-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262494",
"url": "https://www.ibm.com/support/pages/node/7262494"
},
{
"published_at": "2026-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262548",
"url": "https://www.ibm.com/support/pages/node/7262548"
},
{
"published_at": "2026-03-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7262325",
"url": "https://www.ibm.com/support/pages/node/7262325"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259901",
"url": "https://www.ibm.com/support/pages/node/7259901"
}
]
}
CERTFR-2023-AVI-0705
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.0.3 sans le correctif de sécurité iFix08 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.0.3 sans le correctif de sécurité iFix 08 | ||
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.1.0 sans le correctif de sécurité GA | ||
| IBM | QRadar User Behavior Analytics | IBM QRadar User Behavior Analytics versions antérieures à 4.1.13 | ||
| IBM | Tivoli Monitoring | IBM Tivoli Monitoring versions 6.x.x antérieures à 6.3.0.7 Plus Service Pack 5 | ||
| IBM | Cloud Pak | IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x antérieures à 4.7.2 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.1.0 sans le correctif de sécurité iFix 04 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "QRadar User Behavior Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Monitoring versions 6.x.x ant\u00e9rieures \u00e0 6.3.0.7 Plus Service Pack 5",
"product": {
"name": "Tivoli Monitoring",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x ant\u00e9rieures \u00e0 4.7.2",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 04",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32213"
},
{
"name": "CVE-2023-32697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32697"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-28498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28498"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-27554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27554"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2022-39161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39161"
},
{
"name": "CVE-2021-43803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43803"
},
{
"name": "CVE-2022-32222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32222"
},
{
"name": "CVE-2023-24966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24966"
},
{
"name": "CVE-2022-32212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26920"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2023-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35890"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-32215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32215"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-29261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29261"
},
{
"name": "CVE-2021-37699",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37699"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-32214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32214"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22874"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-32338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32338"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0705",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029765 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029765"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029766 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7027925 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7027925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029732 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029732"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029864 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029864"
}
]
}
CERTFR-2024-AVI-0228
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect - Direct pour Microsoft Windows versions 6.3.0.x antérieures à 6.3.0.2_iFix012 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.0 sans le correctif de sécurité iFix 03 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.3 sans le correctif de sécurité iFix 11 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.2.2.x antérieures à 6.2.2.2 sans le dernier correctif de sécurité | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF06 | ||
| IBM | Sterling | Sterling Connect - Direct pour Microsoft Windows versions 6.2.0.x antérieures à 6.2.0.6_iFix012 | ||
| IBM | Db2 | IBM Db2 Web Query pour i version 2.4.0 sans les correctifs de sécurité SI85982 et SI85987 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.2.0.x antérieures à 6.2.0.7 sans le dernier correctif de sécurité | ||
| IBM | Sterling | Sterling Connect - Direct File Agent versions 1.4.0.x antérieures à 1.4.0.3_iFix004 | ||
| IBM | Sterling | Sterling Partner Engagement Manager versions 6.1.2.x antérieures à 6.1.2.9 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect - Direct pour Microsoft Windows versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.2_iFix012",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 03",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 11",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.2.2.x ant\u00e9rieures \u00e0 6.2.2.2 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF06",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect - Direct pour Microsoft Windows versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6_iFix012",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query pour i version 2.4.0 sans les correctifs de s\u00e9curit\u00e9 SI85982 et SI85987",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.7 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect - Direct File Agent versions 1.4.0.x ant\u00e9rieures \u00e0 1.4.0.3_iFix004",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Partner Engagement Manager versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.9 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-47699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47699"
},
{
"name": "CVE-2023-46179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46179"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-46182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46182"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2022-46337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46337"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-47147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47147"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2022-41678",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41678"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2023-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34034"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39685"
},
{
"name": "CVE-2023-47162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47162"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-45177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45177"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-24839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24839"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-46181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46181"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0228",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142007 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142038 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142038"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138527 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138527"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138509 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138509"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7140420 du 13 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7140420"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138477 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138477"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142032 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142032"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138522 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138522"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7137248 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7137248"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7137258 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7137258"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7138503 du 12 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7138503"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7142006 du 14 mars 2024",
"url": "https://www.ibm.com/support/pages/node/7142006"
}
]
}
CERTFR-2023-AVI-0705
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.0.3 sans le correctif de sécurité iFix08 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.0.3 sans le correctif de sécurité iFix 08 | ||
| IBM | Sterling | IBM Sterling Secure Proxy versions versions antérieures à 6.1.0 sans le correctif de sécurité GA | ||
| IBM | QRadar User Behavior Analytics | IBM QRadar User Behavior Analytics versions antérieures à 4.1.13 | ||
| IBM | Tivoli Monitoring | IBM Tivoli Monitoring versions 6.x.x antérieures à 6.3.0.7 Plus Service Pack 5 | ||
| IBM | Cloud Pak | IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x antérieures à 4.7.2 | ||
| IBM | Sterling | IBM Sterling External Authentication Server versions antérieures à 6.1.0 sans le correctif de sécurité iFix 04 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.0.3 sans le correctif de s\u00e9curit\u00e9 iFix 08",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Secure Proxy versions versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar User Behavior Analytics versions ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "QRadar User Behavior Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Tivoli Monitoring versions 6.x.x ant\u00e9rieures \u00e0 6.3.0.7 Plus Service Pack 5",
"product": {
"name": "Tivoli Monitoring",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Dashboards on Cloud Pak for Data versions 4.7.x ant\u00e9rieures \u00e0 4.7.2",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling External Authentication Server versions ant\u00e9rieures \u00e0 6.1.0 sans le correctif de s\u00e9curit\u00e9 iFix 04",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-32213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32213"
},
{
"name": "CVE-2023-32697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32697"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2020-28498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28498"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-27554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27554"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2021-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-32342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32342"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2022-39161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39161"
},
{
"name": "CVE-2021-43803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43803"
},
{
"name": "CVE-2022-32222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32222"
},
{
"name": "CVE-2023-24966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24966"
},
{
"name": "CVE-2022-32212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26920"
},
{
"name": "CVE-2021-33813",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33813"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2023-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35890"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-32215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32215"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-29261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29261"
},
{
"name": "CVE-2021-37699",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37699"
},
{
"name": "CVE-2023-34104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34104"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-32214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32214"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22874"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-32338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32338"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0705",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029765 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029765"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029766 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029766"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7027925 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7027925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029732 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029732"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029864 du 31 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7029864"
}
]
}
CERTFR-2023-AVI-0574
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.5.0 sans le correctif de sécurité 7.5.0-QRADAR-PROTOCOL-MQJMS-7.5-20230327175444 | ||
| IBM | Sterling Control Center | IBM Sterling Control Center versions 6.1.3.x antérieures à 6.1.3.0 iFix18 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 7 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 2 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.1 à 1.5.0.2.x antérieures à 1.5.0.2.iFix36 | ||
| IBM | Db2 | IBM Db2 Web Query for i versions 2.3.0 et 2.4.0 sans le correctif de sécurité | ||
| IBM | N/A | AIX versions 7.2. et 7.3 et VIOS version 3.1 avec un fichier bind.rte versions 7.1.916.0 à 7.1.916.2601 sans le dernier correctif de sécurité | ||
| IBM | QRadar SIEM | IBM QRadar SIEM version 7.4.0 sans le correctif de sécurité 7.4.0-QRADAR-PROTOCOL-MQJMS-7.4-20230327175451 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM version 7.5.0 sans le correctif de s\u00e9curit\u00e9 7.5.0-QRADAR-PROTOCOL-MQJMS-7.5-20230327175444",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions 6.1.3.x ant\u00e9rieures \u00e0 6.1.3.0 iFix18",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 7",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Browser User Interface versions 1.4.1.1 \u00e0 1.5.0.2.x ant\u00e9rieures \u00e0 1.5.0.2.iFix36",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 Web Query for i versions 2.3.0 et 2.4.0 sans le correctif de s\u00e9curit\u00e9",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2. et 7.3 et VIOS version 3.1 avec un fichier bind.rte versions 7.1.916.0 \u00e0 7.1.916.2601 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM version 7.4.0 sans le correctif de s\u00e9curit\u00e9 7.4.0-QRADAR-PROTOCOL-MQJMS-7.4-20230327175451",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-25929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25929"
},
{
"name": "CVE-2019-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4378"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2021-39034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39034"
},
{
"name": "CVE-2020-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4320"
},
{
"name": "CVE-2019-4049",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4049"
},
{
"name": "CVE-2021-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38949"
},
{
"name": "CVE-2019-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4055"
},
{
"name": "CVE-2022-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3736"
},
{
"name": "CVE-2020-4682",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4682"
},
{
"name": "CVE-2023-28530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28530"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2019-4614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4614"
},
{
"name": "CVE-2019-4762",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4762"
},
{
"name": "CVE-2019-4655",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4655"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2020-4338",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4338"
},
{
"name": "CVE-2019-4656",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4656"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3924"
},
{
"name": "CVE-2019-4227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4227"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2019-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4619"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2019-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4261"
},
{
"name": "CVE-2019-4719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4719"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2020-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4310"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0574",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7013143 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7013143"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011771 du 13 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011771"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7013297 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7013297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012711 du 18 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012711"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012621 du 19 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012621"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7012395 du 17 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7012395"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2023-AVI-0541
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix088 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.3.0.x antérieures à 6.3.0.0.iFix011 | ||
| IBM | Db2 | IBM Db2 versions 10.5.x.x antérieures à 10.5 FP11 sans le dernier correctif temporaire | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct FTP+ versions 1.3.x antérieures à 1.3.0.iFix024 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x antérieures à 11.5.7 sans le dernier correctif temporaire | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.2.0.x antérieures à 6.2.0.6.iFix024 | ||
| IBM | Db2 | IBM Db2 versions 11.5.x antérieures à 11.5.8 sans le dernier correctif temporaire | ||
| IBM | Db2 | IBM Db2 versions 11.1.4.x antérieures à 11.1.4 FP7 sans le dernier correctif temporaire | ||
| IBM | Sterling | IBM Sterling Connect:Express pour UNIX version 1.5 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour UNIX versions 6.0.0x. antérieures à 6.0.0.2.iFix152 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.4.iFix088",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.0.iFix011",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 10.5.x.x ant\u00e9rieures \u00e0 10.5 FP11 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct FTP+ versions 1.3.x ant\u00e9rieures \u00e0 1.3.0.iFix024",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.7 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6.iFix024",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.8 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 versions 11.1.4.x ant\u00e9rieures \u00e0 11.1.4 FP7 sans le dernier correctif temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Express pour UNIX version 1.5",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour UNIX versions 6.0.0x. ant\u00e9rieures \u00e0 6.0.0.2.iFix152",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2023-32331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32331"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010565"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 07 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010571"
}
],
"reference": "CERTFR-2023-AVI-0541",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011443 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011443"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011409 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7011409"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7011405 du 12 juillet 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7010557 du 12 juillet 2023",
"url": "https://www.ibm.com/support/pages/node/7010557"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2026-AVI-0131
Vulnerability from certfr_avis - Published: 2026-02-06 - Updated: 2026-02-06
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x et postérieures, antérieures à 2.3.6.1 | ||
| IBM | Cognos Analytics | Cognos Command Center versions 10.2.4.x et 10.2.5.x antérieures à 10.2.5 FP1 IF2 | ||
| IBM | Db2 | DB2 sans le correctif de sécurité 11.5.9 Special Build 62071 | ||
| IBM | Db2 | DB2 Data Management Console antérieures à 3.1.13.1 | ||
| IBM | Db2 | DB2 Data Management Console on CPD versions antérieurs à 4.8 | ||
| IBM | Db2 | DB2 Recovery Expert for LUW version 5.5 IF2 sans le correctif de sécurité v5.5.0.1 Interim Fix 8 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x et post\u00e9rieures, ant\u00e9rieures \u00e0 2.3.6.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions 10.2.4.x et 10.2.5.x ant\u00e9rieures \u00e0 10.2.5 FP1 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 sans le correctif de s\u00e9curit\u00e9 11.5.9 Special Build 62071",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console on CPD versions ant\u00e9rieurs \u00e0 4.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Recovery Expert for LUW version 5.5 IF2 sans le correctif de s\u00e9curit\u00e9 v5.5.0.1 Interim Fix 8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27903"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2015-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3627"
},
{
"name": "CVE-2025-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27904"
},
{
"name": "CVE-2025-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27533"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-27900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27900"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-27899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27899"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-27901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27901"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-27898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27898"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2026-02-06T00:00:00",
"last_revision_date": "2026-02-06T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0131",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259447",
"url": "https://www.ibm.com/support/pages/node/7259447"
},
{
"published_at": "2026-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7253572",
"url": "https://www.ibm.com/support/pages/node/7253572"
},
{
"published_at": "2026-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7257780",
"url": "https://www.ibm.com/support/pages/node/7257780"
},
{
"published_at": "2026-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259901",
"url": "https://www.ibm.com/support/pages/node/7259901"
},
{
"published_at": "2026-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7259526",
"url": "https://www.ibm.com/support/pages/node/7259526"
}
]
}
CERTFR-2025-AVI-0967
Vulnerability from certfr_avis - Published: 2025-11-05 - Updated: 2025-11-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | File Integrity Monitoring pour VMware Tanzu Platform versions antérieures à 2.1.49 | ||
| VMware | Tanzu Platform | Cloud Service Broker pour Azure pour VMware Tanzu Platform versions antérieures à 1.13.1 | ||
| VMware | Tanzu Platform | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Platform | Scheduler pour VMware Tanzu Platform versions antérieures à 2.0.21 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Platform | .NET Core Buildpack versions antérieures à 2.4.64 | ||
| VMware | Tanzu Platform | VMware Tanzu Data Flow sur Tanzu Platform versions antérieures à 2.0.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.4 | ||
| VMware | Tanzu Platform | CredHub Secrets Management pour VMware Tanzu Platform versions antérieures à 1.6.7 | ||
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.8 | ||
| VMware | Tanzu Platform | Go Buildpack versions antérieures à 1.10.57 | ||
| VMware | Tanzu Platform | VMware Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Platform | NodeJS Buildpack versions antérieures à 1.8.61 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.0 | ||
| VMware | Tanzu Platform | Application Services pour VMware Tanzu Platform versions antérieures à 3.3.11 | ||
| VMware | Tanzu Platform | IPsec Encryption pour VMware Tanzu Platform versions antérieures à 1.9.68 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "File Integrity Monitoring pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.49",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Service Broker pour Azure pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.13.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.21",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.64",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Data Flow sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.8",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.57",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.61",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "IPsec Encryption pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.9.68",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-7409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7409"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2024-6505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6505"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-43484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43484"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-54798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54798"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3447"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38229"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-43483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43483"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-58446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58446"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3446"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-43485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43485"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2025-6242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6242"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-61620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61620"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36323",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36323"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36343",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36343"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36326"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36305",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36305"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36345",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36345"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36329"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36316"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36331"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36334",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36334"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36335",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36335"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36340",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36340"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36319",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36319"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36339",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36339"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36322",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36322"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36321",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36321"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36324"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36336",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36336"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36318",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36318"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36337",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36337"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36346",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36346"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36315"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36317",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36317"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36344",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36344"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36341",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36341"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36314",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36314"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36330"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36332",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36332"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36304",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36304"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36342",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36342"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36333",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36333"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36327"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36338",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36338"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36328"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36325"
}
]
}
CERTFR-2023-AVI-0446
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | IBM WebSphere Service Registry and Repository versions 8.5.x antérieures sans le dernier correctif de sécurité V8.5.6.3_IJ47124 | ||
| IBM | WebSphere | IBM WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de sécurité V8.5.6.3_IJ47124 | ||
| IBM | QRadar WinCollect Agent | QRadar WinCollect Agent versions 10.0.x à 10.1.x antérieures à 10.1.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM WebSphere Service Registry and Repository versions 8.5.x ant\u00e9rieures sans le dernier correctif de s\u00e9curit\u00e9 V8.5.6.3_IJ47124",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Service Registry and Repository Studio versions 8.5.x sans le dernier correctif de s\u00e9curit\u00e9 V8.5.6.3_IJ47124",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions 10.0.x \u00e0 10.1.x ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7002387 du 08 juin 2023",
"url": "https://www.ibm.com/support/pages/node/7002387"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7002501 du 08 juin 2023",
"url": "https://www.ibm.com/support/pages/node/7002501"
}
]
}
CERTFR-2025-AVI-0003
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 warehouse versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24795"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2022-31163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31163"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2021-41186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41186"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-0759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0759"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2021-32740",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32740"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0003",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180133",
"url": "https://www.ibm.com/support/pages/node/7180133"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180137",
"url": "https://www.ibm.com/support/pages/node/7180137"
},
{
"published_at": "2025-01-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180105",
"url": "https://www.ibm.com/support/pages/node/7180105"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180134",
"url": "https://www.ibm.com/support/pages/node/7180134"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180135",
"url": "https://www.ibm.com/support/pages/node/7180135"
},
{
"published_at": "2025-01-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7180138",
"url": "https://www.ibm.com/support/pages/node/7180138"
}
]
}
CERTFR-2023-AVI-0686
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | AIX | AIX version 7.2 sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec python versions 3.9.x antérieures à 3.9.17 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.15.1 | ||
| IBM | AIX | AIX version 7.3 sans le dernier correctif de sécurité | ||
| IBM | VIOS | VIOS 3.1 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AIX version 7.2 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec python versions 3.9.x ant\u00e9rieures \u00e0 3.9.17",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.15.1",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS 3.1 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0461"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3567"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2196"
},
{
"name": "CVE-2023-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22998"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2023-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1195"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2023-40371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40371"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2022-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2022-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3566"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0686",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028095 du 18 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028095"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028420 du 23 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028420"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7028316 du 22 ao\u00fbt 2023",
"url": "https://www.ibm.com/support/pages/node/7028316"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2024-AVI-0057
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.0.0.x antérieures à 6.0.0.4_iFix083 | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de sécurité PH58718 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.2.0.x antérieures à 6.2.0.6_iFix006 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.3.0.x antérieures à 6.3.0.2_iFix005 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5. à 7.5.0 UP7 sans le correctif de sécurité 7.5.0 UP7 IF04 | ||
| IBM | Sterling | IBM Sterling Connect Direct pour Microsoft Windows versions 6.1.0.x antérieures à 6.1.0.2_iFix079 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.4_iFix083",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 10.1.0, 10.1.1, 10.1.2 et 11.0.0 sans le correctif de s\u00e9curit\u00e9 PH58718",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.6_iFix006",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.3.0.x ant\u00e9rieures \u00e0 6.3.0.2_iFix005",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5. \u00e0 7.5.0 UP7 sans le correctif de s\u00e9curit\u00e9 7.5.0 UP7 IF04",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect Direct pour Microsoft Windows versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2_iFix079",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-34059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
},
{
"name": "CVE-2023-34058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50164"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50950"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7108657 du 17 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7108657"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7108659 du 17 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7108659"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7107841 du 16 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7107841"
}
]
}
CERTFR-2023-AVI-0325
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Oracle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20 | ||
| Oracle | Database Server | Oracle Database Server 19c, 21c | ||
| Oracle | N/A | Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1 | ||
| Oracle | PeopleSoft | Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2 | ||
| Oracle | Virtualization | Oracle Virtualization versions 6.1.x antérieures à 6.1.44 | ||
| Oracle | MySQL | Oracle MySQL versions 8.0.33 et antérieures | ||
| Oracle | Systems | Oracle Systems versions 10, 11 | ||
| Oracle | Virtualization | Oracle Virtualization versions 7.0.x antérieures à 7.0.8 | ||
| Oracle | MySQL | Oracle MySQL versions 5.7.41 et antérieures | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database Server 19c, 21c",
"product": {
"name": "Database Server",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM Enterprise Edition: 20.3.8, 20.3.9, 21.3.4, 21.3.5, 22.3.0, 22.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft versions 8.58, 8.59, 8.60, 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Virtualization versions 6.1.x ant\u00e9rieures \u00e0 6.1.44",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 8.0.33 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Systems versions 10, 11",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Virtualization versions 7.0.x ant\u00e9rieures \u00e0 7.0.8",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 5.7.41 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21916"
},
{
"name": "CVE-2023-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21985"
},
{
"name": "CVE-2023-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21979"
},
{
"name": "CVE-2023-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21986"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-21940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21940"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21962"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21917"
},
{
"name": "CVE-2023-21984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21984"
},
{
"name": "CVE-2023-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21956"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21945"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2023-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21966"
},
{
"name": "CVE-2023-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21947"
},
{
"name": "CVE-2023-22002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22002"
},
{
"name": "CVE-2023-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21981"
},
{
"name": "CVE-2023-21987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21987"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21971",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21971"
},
{
"name": "CVE-2023-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21999"
},
{
"name": "CVE-2023-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21928"
},
{
"name": "CVE-2023-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21972"
},
{
"name": "CVE-2023-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21960"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2023-21990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21990"
},
{
"name": "CVE-2023-22000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22000"
},
{
"name": "CVE-2023-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21913"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
},
{
"name": "CVE-2020-6950",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6950"
},
{
"name": "CVE-2023-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21996"
},
{
"name": "CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"name": "CVE-2023-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21953"
},
{
"name": "CVE-2023-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21934"
},
{
"name": "CVE-2023-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22003"
},
{
"name": "CVE-2023-21998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21998"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21946"
},
{
"name": "CVE-2023-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21933"
},
{
"name": "CVE-2023-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21931"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-45143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45143"
},
{
"name": "CVE-2023-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21896"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2023-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21964"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2023-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21920"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21918"
},
{
"name": "CVE-2023-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21992"
},
{
"name": "CVE-2023-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21911"
},
{
"name": "CVE-2023-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21976"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21991"
},
{
"name": "CVE-2023-21989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21989"
},
{
"name": "CVE-2023-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21982"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21935"
},
{
"name": "CVE-2020-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25638"
},
{
"name": "CVE-2023-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21955"
},
{
"name": "CVE-2023-21988",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21988"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2022-45047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
},
{
"name": "CVE-2022-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36033"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21929"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22001"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2023-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21948"
},
{
"name": "CVE-2023-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21919"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0325",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-19T00:00:00.000000"
},
{
"description": "Correction coquilles.",
"revision_date": "2023-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2023 du 18 avril 2023",
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
RHSA-2023:1900
Vulnerability from csaf_redhat - Published: 2023-04-20 04:04 - Updated: 2025-11-21 18:39Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186805)\n\n* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186812)\n\n* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186808)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1900",
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2186805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186805"
},
{
"category": "external",
"summary": "2186808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186808"
},
{
"category": "external",
"summary": "2186812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186812"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1900.json"
}
],
"title": "Red Hat Security Advisory: java-17-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:39:29+00:00",
"generator": {
"date": "2025-11-21T18:39:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1900",
"initial_release_date": "2023-04-20T04:04:39+00:00",
"revision_history": [
{
"date": "2023-04-20T04:04:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-20T04:04:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:39:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el9_0?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el9_0?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T04:04:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"AppStream-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.src",
"CRB-9.0.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el9_0.x86_64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.aarch64",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.ppc64le",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.s390x",
"CRB-9.0.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023_1905
Vulnerability from csaf_redhat - Published: 2023-04-25 03:24 - Updated: 2024-11-22 22:56Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1905",
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1905.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
"tracking": {
"current_release_date": "2024-11-22T22:56:11+00:00",
"generator": {
"date": "2024-11-22T22:56:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:1905",
"initial_release_date": "2023-04-25T03:24:02+00:00",
"revision_history": [
{
"date": "2023-04-25T03:24:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-25T03:24:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:56:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.372.b07-1.el8_2?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.372.b07-1.el8_2?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1905"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.ppc64le",
"AppStream-8.2.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.src",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_2.noarch",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_2.x86_64",
"AppStream-8.2.0.Z.TUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023:1911
Vulnerability from csaf_redhat - Published: 2023-04-25 03:11 - Updated: 2025-11-21 18:39Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1911",
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1911.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:39:36+00:00",
"generator": {
"date": "2025-11-21T18:39:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1911",
"initial_release_date": "2023-04-25T03:11:33+00:00",
"revision_history": [
{
"date": "2023-04-25T03:11:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-25T03:11:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:39:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.372.b07-1.el8_1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.372.b07-1.el8_1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)",
"product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64",
"relates_to_product_reference": "AppStream-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:11:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1911"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.src",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_1.noarch",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_1.x86_64",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.ppc64le",
"AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023_1880
Vulnerability from csaf_redhat - Published: 2023-04-19 16:04 - Updated: 2024-11-22 22:55Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1880",
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1880.json"
}
],
"title": "Red Hat Security Advisory: java-11-openjdk security update",
"tracking": {
"current_release_date": "2024-11-22T22:55:01+00:00",
"generator": {
"date": "2024-11-22T22:55:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:1880",
"initial_release_date": "2023-04-19T16:04:04+00:00",
"revision_history": [
{
"date": "2023-04-19T16:04:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-19T16:04:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:55:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"product": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"product_id": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.19.0.7-1.el9_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"product": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_id": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.19.0.7-1.el9_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"product": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"product_id": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.19.0.7-1.el9_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"product": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"product_id": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.19.0.7-1.el9_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"product": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"product_id": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-11-openjdk@11.0.19.0.7-1.el9_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
},
"product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T16:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1880"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.src",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-debugsource-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-demo-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-javadoc-zip-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-jmods-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-slowdebug-debuginfo-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-src-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-fastdebug-1:11.0.19.0.7-1.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:java-11-openjdk-static-libs-slowdebug-1:11.0.19.0.7-1.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023:1883
Vulnerability from csaf_redhat - Published: 2023-04-19 19:27 - Updated: 2026-03-18 02:22Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenJDK.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1883",
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1883.json"
}
],
"title": "Red Hat Security Advisory: OpenJDK 11.0.19 Security Update for Windows Builds",
"tracking": {
"current_release_date": "2026-03-18T02:22:31+00:00",
"generator": {
"date": "2026-03-18T02:22:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2023:1883",
"initial_release_date": "2023-04-19T19:27:22+00:00",
"revision_history": [
{
"date": "2023-04-19T19:27:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-19T19:27:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:22:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Build of OpenJDK 11.0.19",
"product": {
"name": "Red Hat Build of OpenJDK 11.0.19",
"product_id": "Red Hat Build of OpenJDK 11.0.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openjdk:11::windows"
}
}
}
],
"category": "product_family",
"name": "OpenJDK"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 11.0.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-19T19:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 11.0.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1883"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 11.0.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023:1906
Vulnerability from csaf_redhat - Published: 2023-04-25 03:49 - Updated: 2025-11-21 18:39Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1906",
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1906.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:39:32+00:00",
"generator": {
"date": "2025-11-21T18:39:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1906",
"initial_release_date": "2023-04-25T03:49:24+00:00",
"revision_history": [
{
"date": "2023-04-25T03:49:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-25T03:49:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:39:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_6?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.372.b07-1.el8_6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.372.b07-1.el8_6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.372.b07-1.el8_6?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T03:49:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.372.b07-1.el8_6.noarch",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.372.b07-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.372.b07-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023_1912
Vulnerability from csaf_redhat - Published: 2023-04-25 11:06 - Updated: 2024-11-22 22:56Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for OpenJDK.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (8u372) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u362) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1912",
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1912.json"
}
],
"title": "Red Hat Security Advisory: OpenJDK 8u372 Windows Security Update",
"tracking": {
"current_release_date": "2024-11-22T22:56:02+00:00",
"generator": {
"date": "2024-11-22T22:56:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:1912",
"initial_release_date": "2023-04-25T11:06:07+00:00",
"revision_history": [
{
"date": "2023-04-25T11:06:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-25T11:06:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:56:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Build of OpenJDK 8u362",
"product": {
"name": "Red Hat Build of OpenJDK 8u362",
"product_id": "Red Hat Build of OpenJDK 8u362",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openjdk:1.8::windows"
}
}
}
],
"category": "product_family",
"name": "OpenJDK"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing string checks for NULL characters (8296622)"
},
{
"cve": "CVE-2023-21938",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187758"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21938"
},
{
"category": "external",
"summary": "RHBZ#2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21938"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)"
},
{
"cve": "CVE-2023-21939",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187724"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Swing HTML parsing issue (8296832)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21939"
},
{
"category": "external",
"summary": "RHBZ#2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21939"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Swing HTML parsing issue (8296832)"
},
{
"cve": "CVE-2023-21954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187441"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21954"
},
{
"category": "external",
"summary": "RHBZ#2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21954"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: incorrect enqueue of references in garbage collector (8298191)"
},
{
"cve": "CVE-2023-21967",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187704"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21967"
},
{
"category": "external",
"summary": "RHBZ#2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21967"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: certificate validation issue in TLS session negotiation (8298310)"
},
{
"cve": "CVE-2023-21968",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187802"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Build of OpenJDK 8u362"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21968"
},
{
"category": "external",
"summary": "RHBZ#2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21968"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-25T11:06:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Build of OpenJDK 8u362"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1912"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Build of OpenJDK 8u362"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)"
}
]
}
RHSA-2023:1891
Vulnerability from csaf_redhat - Published: 2023-04-20 01:20 - Updated: 2025-11-21 18:39Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-158 - Improper Neutralization of Null Byte or NUL CharacterVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CWE-20 - Improper Input Validation| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186828)\n\n* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186832)\n\n* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186836)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1891",
"url": "https://access.redhat.com/errata/RHSA-2023:1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2186828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186828"
},
{
"category": "external",
"summary": "2186832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186832"
},
{
"category": "external",
"summary": "2186836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186836"
},
{
"category": "external",
"summary": "2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "2187441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"
},
{
"category": "external",
"summary": "2187704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"
},
{
"category": "external",
"summary": "2187724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"
},
{
"category": "external",
"summary": "2187758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"
},
{
"category": "external",
"summary": "2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "2187802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1891.json"
}
],
"title": "Red Hat Security Advisory: java-17-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:39:32+00:00",
"generator": {
"date": "2025-11-21T18:39:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1891",
"initial_release_date": "2023-04-20T01:20:10+00:00",
"revision_history": [
{
"date": "2023-04-20T01:20:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-04-20T01:20:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:39:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el8_6?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el8_6?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el8_6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"product": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"product_id": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.7.0.7-1.el8_6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"product": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"product_id": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-17-openjdk@17.0.7.0.7-1.el8_6?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.6)",
"product_id": "CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
},
"product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21930",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187435"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: improper connection handling during TLS handshake (8294474)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21930"
},
{
"category": "external",
"summary": "RHBZ#2187435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21930"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T01:20:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1891"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK: improper connection handling during TLS handshake (8294474)"
},
{
"cve": "CVE-2023-21937",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2023-04-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187790"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: missing string checks for NULL characters (8296622)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-21937"
},
{
"category": "external",
"summary": "RHBZ#2187790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21937"
}
],
"release_date": "2023-04-18T20:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-04-20T01:20:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1891"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"AppStream-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.src",
"CRB-8.6.0.Z.EUS:java-17-openjdk-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_6.x86_64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.aarch64",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.ppc64le",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.s390x",
"CRB-8.6.0.Z.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Open